Book Image

SQL Injection Strategies

By : Ettore Galluccio, Edoardo Caselli, Gabriele Lombari
Book Image

SQL Injection Strategies

By: Ettore Galluccio, Edoardo Caselli, Gabriele Lombari

Overview of this book

SQL injection (SQLi) is probably the most infamous attack that can be unleashed against applications on the internet. SQL Injection Strategies is an end-to-end guide for beginners looking to learn how to perform SQL injection and test the security of web applications, websites, or databases, using both manual and automated techniques. The book serves as both a theoretical and practical guide to take you through the important aspects of SQL injection, both from an attack and a defense perspective. You’ll start with a thorough introduction to SQL injection and its impact on websites and systems. Later, the book features steps to configure a virtual environment, so you can try SQL injection techniques safely on your own computer. These tests can be performed not only on web applications but also on web services and mobile applications that can be used for managing IoT environments. Tools such as sqlmap and others are then covered, helping you understand how to use them effectively to perform SQL injection attacks. By the end of this book, you will be well-versed with SQL injection, from both the attack and defense perspective.
Table of Contents (11 chapters)
1
Section 1: (No)SQL Injection in Theory
4
Section 2: SQL Injection in Practice

The target – configuring your target web applications

In all of our tests, we will be using the Kali Linux installation we previously set up as the client side. In order to cover the cases previously described in this book (web application and IoT devices), we need multiple target configurations.

First, we will show how to set up the VM that will be used as a testing target for web application-based SQL injection attacks, by using the web applications included in the OWASP BWA VM. In this case, the setup is quite simple and linear.

Download the latest version of the OWASP BWA VM from the official OWASP website by following the link to Sourceforge, as reported on the OWASP BWA main page:

https://sourceforge.net/projects/owaspbwa/files/

Unfortunately, in these last months, the OWASP BWA main page has been migrated to another platform, so it is only accessible as a poorly formatted page, awaiting to be moved to the new platform. You can find it at this URL:

https...